Juiker app stores debug logs which contains sensitive information to mobile external storage. An unauthenticated physical attacker can access these files to acquire partial user information such as personal...
2.4CVSS
3.7AI Score
0.0005EPSS
Juiker app hard-coded its AES key in the source code. A physical attacker, after getting the Android root privilege, can use the AES key to decrypt usersβ ciphertext and tamper with...
6.1CVSS
5.9AI Score
0.001EPSS